Open Access Open Access  Restricted Access Subscription or Fee Access

A Key Management Scheme for VANET Based on Vector Group

S. Christal, S. Sumitha

Abstract


Vehicular Ad–Hoc Networks can offer various service to the user. In this paper, we propose vector Based Cryptosystem to achieve security in terms of privacy and authentication. A Key management scheme based on vector group is to be proposed for VANET to overcome high memory overhead and also to reduce the high computational time in the existing system.

Keywords


Key Management, Privacy, Authentication, Energy Consumption, Pair Wise Key Establishment

Full Text:

PDF

References


Jinyuan Sun and Yuguang Fang “A defense technique against misbehavior in VANETs based on threshold authentication” University of Florida, Gainesville, FL, Conference, 2008. MILCOM 2008. IEEE W.-K. Chen, Linear Networks and Systems. Belmont, Calif.: Wadsworth, pp. 123-135, 1993. (Book style)

An Identity based security system for User privacy in Vehicular Ad hoc networks,jinyuan sun, Chl Zhangand Yuguang Fang,Fellow ieee sep 2010.

B. Parno and A. Perrig, “Challenges in Securing Vehicular Networks,” Proc. Fourth Workshop Hot Topics in Networks (HotNets IV), Nov. 2005.

Yacine Challal, Hamida Seba“GroupKey Management Protocols: A Novel Taxonomy” VOLUME 2 NUMBER 2 2005 ISSN 1305-239X

J. Yin, T. Elbatt, G. Yeung, B. Ryu, S. Habermas, H. Krishnan, and T. Talty, “Performance Evaluation of Safety Applications over DSRC Vehicular Ad Hoc Networks,” Proc. First ACM Int‟l Workshop Vehicular Ad Hoc Networks (VANET ‟04), Oct. 2004.

J. Sun, C. Zhang, and Y. Fang, “A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks,” Proc. IEEE INFOCOM, pp. 1687-1695, Apr. 2008.

P. Golle, D. Greene, and J. Staddon, “Detecting and Correcting Malicious Data in VANETs,” Proc. First ACM Int‟l Workshop Vehicular Ad Hoc Networks (VANET ‟04), pp. 29-37, Oct. 2004.

Jinhua Guo, John P. Baugh, and Shengquan Wang “A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework” Department of Computer and Information Science, University of Michigan-Dearborn- 2007

T. Leinmu¨ ller, E. Schoch, and F. Kargl, “Position Verification Approaches for Vehicular Ad Hoc Networks,” Proc. IEEE Wireless Comm., pp. 16-21, Oct. 2006.

K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, “Caravan: Providing Location Privacy for Vanet,”Proc. Embedded Security in Cars (ESCAR), 2005.

J.Y. Choi, M. Jakobsson, and S. Wetzel, “Balancing Auditability and Privacy in Vehicular Networks,” Proc. First ACM Int‟l Workshop QoS and Security for Wireless and Mobile Networks (Q2SWinet ‟05), pp. 79-87, Oct. 2005.

R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen. ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In to Appear INFOCOM 2008.

Raya, A. Aziz, and J.P. Hubaux, “Efficient Secure Aggregation in VANETs,” Proc. Third ACM Int‟l Workshop Vehicular Ad Hoc Networks (VANET ‟06), pp. 67-75, Sept. 2006.

M.E. Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, “Security Issues in a Future Vehicular Network,” Proc. European Wireless Conf. ‟02, Feb. 2002.

G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, “Efficient and Robust Pseudonymous Authentication in VANET,”Proc. Fourth ACM Int‟l Workshop Vehicular Ad Hoc Networks (VANET ‟07), pp. 19-28, 2007.

M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux, “Eviction of Misbehaving and Faulty Nodes in Vehicular Networks,”IEEE J. Selected Areas Comm., vol. 25, no. 8, pp. 1557-1568, Oct. 2007.

TongZhou;Choudhury,R.R.;PengNing;Chakrabarty,K. DukeUniv.,Durham “Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks” North Carolina State University, Duke University 2008

M. Raya and J. P. Hubaux, “The security of vehicular ad hoc networks”, In Prof. of 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), pp. 11-21, November 2005.

A. Saha and D. Johnson, “Modeling mobility for vehicular ad-hoc networks,” in Proceedings of VANET‟04 (Poster session), 2004.

Krishna Sampigethaya, Mingyan Li, Leping Huang, and Radha Poovendran “AMOEBA: Robust Location Privacy Scheme for VANET” Univ. of Washington, Seattle -2007

A. Studer, E. Shi, F. Bai, and A. Perrig, “TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs,” Proc. Sixth Ann. IEEE SECON Conf. (SECON ‟09), 2009.

A comparative study of Routing Protocols in VANET, Sandhaya Kohli, , Bandanjot Kaur, Dept. of CSE, RIMT-IMT.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.